会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Protocol-Independent remote attestation and sealing
    • 协议无关的远程认证和密封
    • US08161285B2
    • 2012-04-17
    • US12239710
    • 2008-09-26
    • Carl Melvin EllisonJohn M. Parchem
    • Carl Melvin EllisonJohn M. Parchem
    • G06F21/02H04L29/06H04L9/28
    • H04L9/3234G06F21/57H04L9/3236H04L2209/127
    • Messages, including messages in conformance with various protocols, can be hashed and the hash values added to an event log and provided to a Trusted Platform Module (TPM), which can extend one or more Platform Configuration Registers (PCRs) with the hash value, much as it would with the hash of a component that was installed or executed on the computing device with the TPM. Subsequently, the TPM can sign one or more of the PCRs and the signed PCRs can be transmitted, together with the event log and a copy of the messages. The recipient can verify the sender based on the signed PCRs, can confirm that the signed PCRs match the event log, and can verify the hash of the message in the event log by independently hashing it. In another embodiment, an intermediate hashing of the message can avoid transmission of potentially malicious executable instructions within a message.
    • 消息(包括符合各种协议的消息)可以进行散列,将散列值添加到事件日志中,并提供给可信平台模块(TPM),该平台模块可以使用散列值扩展一个或多个平台配置寄存器(PCR) 就像使用TPM在计算设备上安装或执行的组件的哈希一样。 随后,TPM可以签署一个或多个PCR,并且可以与事件日志和消息的副本一起传送签名的PCR。 收件人可以根据签名的PCR验证发件人,可以确认签名的PCR符合事件日志,并可以通过独立散列来验证事件日志中的消息散列。 在另一个实施例中,消息的中间散列可以避免在消息内传输潜在的恶意可执行指令。
    • 3. 发明授权
    • Software enhanced trusted platform module
    • 软件增强可信平台模块
    • US08122514B2
    • 2012-02-21
    • US12183057
    • 2008-07-30
    • Carl Melvin EllisonJohn M. Parchem
    • Carl Melvin EllisonJohn M. Parchem
    • G06F21/02
    • G06F21/575G06F21/57
    • Computer-executable instructions can implement a software-based Trusted Platform Module (TPM) that can have more computational power than the hardware TPM. The software TPM can be protected from modification, or other unauthorized access, via a memory partitioning scheme that enables other computer-executable instructions to access the software TPM in a predefined manner, but yet prohibits other access. A tri-partied partitioning scheme can be used wherein the computer executable instructions of the software TPM reside in a first region, a jump table to appropriate ones of those instructions resides in a second region, and everything else resides in the third region. The storage key of the software TPM can be sealed by the hardware TPM to be released only if the software TPM, and the computing device, are in a known good state, as determined by the Platform Configuration Registers of the hardware TPM, thereby further protecting the software TPM from tampering.
    • 计算机可执行指令可以实现可以具有比硬件TPM更多的计算能力的基于软件的可信平台模块(TPM)。 可以通过使得其他计算机可执行指令以预定义的方式访问软件TPM但仍禁止其他访问的存储器分区方案来保护软件TPM免受修改或其他未经授权的访问。 可以使用三部分划分方案,其中软件TPM的计算机可执行指令驻留在第一区域中,对于这些指令中适当的指令的跳转表驻留在第二区域中,并且一切驻留在第三区域中。 软件TPM的存储密钥可以由硬件TPM密封,只有当软件TPM和计算设备处于已知的良好状态时才被释放,由硬件TPM的平台配置寄存器确定,从而进一步保护 软件TPM从篡改。
    • 6. 发明授权
    • File system active symbolic link
    • 文件系统有效的符号链接
    • US09037620B2
    • 2015-05-19
    • US12639950
    • 2009-12-16
    • Carl Melvin EllisonCharles G. Jeffries
    • Carl Melvin EllisonCharles G. Jeffries
    • G06F17/30
    • G06F17/30126G06F17/30091
    • Data stored on a storage medium can be referenced by multiple independently addressable active symbolic links, with each active symbolic link representing the data through a different transformation. The active symbolic links can be in the form of file system objects, such as files or directories. A single active symbolic link can reference the data stored in multiple collections, or, conversely, a subset of data from a single collection. Active symbolic links can be automatically created for common data transformations. Searching across active symbolic links referencing encrypted data can be performed by multiple protection-specific search engines, or a single search engine that can generate a protection-level aware search index.
    • 存储在存储介质上的数据可以由多个可独立寻址的活动符号链接引用,每个活动符号链接通过不同的变换表示数据。 活动的符号链接可以是文件系统对象的形式,例如文件或目录。 单个有源符号链接可以引用存储在多个集合中的数据,或者相反地,来自单个集合的数据子集。 可以自动创建活动的符号链接,用于常见的数据转换。 可以通过多个保护专用搜索引擎或可以生成保护级别感知搜索索引的单个搜索引擎执行引用加密数据的活动符号链接的搜索。
    • 7. 发明申请
    • FILE SYSTEM ACTIVE SYMBOLIC LINK
    • 文件系统主动符号链接
    • US20110145296A1
    • 2011-06-16
    • US12639950
    • 2009-12-16
    • Carl Melvin EllisonCharles G. Jeffries
    • Carl Melvin EllisonCharles G. Jeffries
    • G06F17/30
    • G06F17/30126G06F17/30091
    • Data stored on a storage medium can be referenced by multiple independently addressable active symbolic links, with each active symbolic link representing the data through a different transformation. The active symbolic links can be in the form of file system objects, such as files or directories. A single active symbolic link can reference the data stored in multiple collections, or, conversely, a subset of data from a single collection. Active symbolic links can be automatically created for common data transformations. Searching across active symbolic links referencing encrypted data can be performed by multiple protection-specific search engines, or a single search engine that can generate a protection-level aware search index.
    • 存储在存储介质上的数据可以由多个可独立寻址的活动符号链接引用,每个活动符号链接通过不同的变换表示数据。 活动的符号链接可以是文件系统对象的形式,例如文件或目录。 单个有源符号链接可以引用存储在多个集合中的数据,或者相反地,来自单个集合的数据子集。 可以自动创建活动的符号链接,用于常见的数据转换。 可以通过多个保护专用搜索引擎或可以生成保护级别感知搜索索引的单个搜索引擎执行引用加密数据的活动符号链接的搜索。
    • 10. 发明申请
    • Protocol-Independent Remote Attestation And Sealing
    • 协议无关的远程认证和密封
    • US20100082984A1
    • 2010-04-01
    • US12239710
    • 2008-09-26
    • Carl Melvin EllisonJohn M. Parchem
    • Carl Melvin EllisonJohn M. Parchem
    • H04L9/32
    • H04L9/3234G06F21/57H04L9/3236H04L2209/127
    • Messages, including messages in conformance with various protocols, can be hashed and the hash values added to an event log and provided to a Trusted Platform Module (TPM), which can extend one or more Platform Configuration Registers (PCRs) with the hash value, much as it would with the hash of a component that was installed or executed on the computing device with the TPM. Subsequently, the TPM can sign one or more of the PCRs and the signed PCRs can be transmitted, together with the event log and a copy of the messages. The recipient can verify the sender based on the signed PCRs, can confirm that the signed PCRs match the event log, and can verify the hash of the message in the event log by independently hashing it. In another embodiment, an intermediate hashing of the message can avoid transmission of potentially malicious executable instructions within a message.
    • 消息(包括符合各种协议的消息)可以进行散列,将散列值添加到事件日志中,并提供给可信平台模块(TPM),该平台模块可以使用散列值扩展一个或多个平台配置寄存器(PCR) 就像使用TPM在计算设备上安装或执行的组件的哈希一样。 随后,TPM可以签署一个或多个PCR,并且可以与事件日志和消息的副本一起传送签名的PCR。 收件人可以根据签名的PCR验证发件人,可以确认签名的PCR符合事件日志,并可以通过独立散列来验证事件日志中的消息散列。 在另一个实施例中,消息的中间散列可以避免在消息内传输潜在的恶意可执行指令。